O Level Exam : Student Portal
Email address
Password
Remember me
Forgot password?
Sign In
Google
Facebook
Don't have an account?
Register now
O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Videos
Projects
True/False Questions : OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 20
Report Bug
Bookmark
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
02
out of 20
Report Bug
Bookmark
Spyware is a software that is used to remove viruses and other malware programs from your computer.
A.
TRUE
B.
FALSE
Question No# :
03
out of 20
Report Bug
Bookmark
The certificate authority signs the digital certificate with it’s own Private key
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
04
out of 20
Report Bug
Bookmark
Right to Privacy are given to authors of literary and artistic works such as books and other writings, musical compositions, paintings, sculpture, computer programs and films.
A.
TRUE
B.
FALSE
Question No# :
05
out of 20
Report Bug
Bookmark
A Gigabyte contains 1000 Megabytes.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
06
out of 20
Report Bug
Bookmark
Quarantine is used when certain virus may be too difficult to be removed completely, this virus are disabled and kept in a safe place so that it cannot infect other files.
A.
TRUE
B.
FALSE
Question No# :
07
out of 20
Report Bug
Bookmark
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 20
Report Bug
Bookmark
The Full Name Of Cms Is Content Management System?
CMS का पूरा नाम Content Management System होता है?
A.
TRUE
B.
FALSE
Question No# :
09
out of 20
Report Bug
Bookmark
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
10
out of 20
Report Bug
Bookmark
A Trojan horse program will replicate itself via files that move from one computer to another.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
11
out of 20
Report Bug
Bookmark
Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
12
out of 20
Report Bug
Bookmark
In a non-moderated newsgroup, only selected members have right to post (write) a message directly on a virtual notice board?
एक नॉन-मॉडरेट न्यूज़ ग्रुप में, केवल चयनित सदस्यों को सीधे वर्चुअल नोटिस बोर्ड पर संदेश पोस्ट करने (लिखने) का अधिकार होता है?
A.
TRUE
B.
FALSE
Question No# :
13
out of 20
Report Bug
Bookmark
The full name of NASSCOM is National Association of Software and Service Companies?
NASSCOM का पूरा नाम National Association of Software and Service Companies होता है?
A.
TRUE
B.
FALSE
Question No# :
14
out of 20
Report Bug
Bookmark
Creating and distributing viruses and/or malicious code on other computers or posting confidential business information on the Internet are also part of cybercrime.
A.
TRUE
B.
FALSE
Question No# :
15
out of 20
Report Bug
Bookmark
A firewall is a security device deployed at the boundary of corporate intranet to protect it from unauthorized access
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
16
out of 20
Report Bug
Bookmark
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
मिश्रित वास्तविकता, अनुभव आभासी वास्तविकता और संवर्धित वास्तविकता से तत्वों को जोडती है?
A.
TRUE
B.
FALSE
Question No# :
17
out of 20
Report Bug
Bookmark
Backup your files regularly to prevent cyber security attacks
साइबर सुरक्षा हमलों को बचने के लिए नियमित रूप से अपनी फ़ाइलों का बैकअप लेना चहिये
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
18
out of 20
Report Bug
Bookmark
ATM is Automatic Teller Machine in terms of Transfer Mode.
एटीएम ट्रांसफर मोड के संदर्भ में स्वचालित टेलर मशीन है।
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
19
out of 20
Report Bug
Bookmark
The main function of proxy application gateway is to allow intranet users to securely use specified internet services
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
20
out of 20
Report Bug
Bookmark
In the internet of things, information system can not be access remotely
A.
TRUE
TRUE
B.
FALSE
FALSE
Latest Current Affairs 2026
Online Exam Quiz for One day Exam
Online Typing Test
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online MBA 2 years
Online MCA
Online BCA
Best Website and Software Company in Allahabad